Studytonight.com: Our mission is to empower young Students to be the inventors and creators.

2019 : Studytonight: Our mission is to empower young Students to be the inventors and creators.

Intermediate:

Ec Council – Certified Ehical Hacker – CEH v10 – Exercices List Complete

Module 02 Footprinting and Reconnaissance

Exercise 1: Open Source Information Gathering Using Windows Command Line Utilities
Exercise 2: Collecting Information About a Target Website Using Firebug
Exercise 3: Mirroring Website Using HTTrack Web Site Copier
Exercise 4: Advanced Network Route Tracing Using Path Analyzer Pro
Exercise 5: Information Gathering Using Metasploit

Module 03 Scanning Networks

Exercise 1: UDP and TCP Packet Crafting Techniques using HPING3
Exercise 2: Scanning The Network Using The Colasoft Packet Builder
Exercise 3: Basic Network Troubleshooting Using MegaPing
Exercise 4: Understanding Network Scanning Using Nmap
Exercise 5: Exploring Various Network Scanning Techniques
Exercise 6: Scanning a Network Using NetScan Tools Pro
Exercise 7: Avoiding Scanning Detection using Multiple Decoy IP Addresses
Exercise 8: Drawing Network Diagrams Using Network Topology Mapper
Exercise 9: Checking for Live Systems Using Angry IP Scanner
Exercise 10: Scanning for Network Traffic Going Through a Computer’s Adapter Using IP-Tools
Exercise 11: Identify Target System OS with TTL and TCP Window Sizes using Wireshark

Module 04 Enumeration

Exercise 1: NetBIOS Enumeration Using Global Network Inventory
Exercise 2: Enumerating Network Resources Using Advanced IP Scanner
Exercise 3: Performing Network Enumeration Using SuperScan
Exercise 4: Enumerating Resources in a Local Machine Using Hyena
Exercise 5: Performing Network Enumeration Using NetBIOS Enumerator
Exercise 6: Enumerating a Network Using SoftPerfect Network Scanner
Exercise 7: Enumerating a Target Network using Nmap and Net Use
Exercise 8: Enumerating Services on a Target Machine
Exercise 9: SNMP Enumeration Using snmp_enum
Exercise 10: LDAP Enumeration Using Active Directory Explorer (ADExplorer)
Exercise 11: Enumerating information from Windows and Samba host using Enum4linux

Module 05 Vulnerability Analysis

Exercise 1: Vulnerability Analysis Using Nessus
Exercise 2: CGI Scanning with Nikto

Module 06 System Hacking

Exercise 1: Dumping and Cracking SAM Hashes to Extract Plaintext Passwords
Exercise 2: Creating and Using Rainbow Tables
Exercise 3: Auditing System Passwords Using L0phtCrack
Exercise 4: Exploiting Client Side Vulnerabilities and Establishing a VNC Session
Exercise 5: Escalating Privileges by Exploiting Client Side Vulnerabilities
Exercise 6: Hacking Windows 10 using Metasploit, and Post-Exploitation Using Meterpreter
Exercise 7: User System Monitoring and Surveillance Using Spytech SpyAgent
Exercise 8: Web Activity Monitoring and Recording using Power Spy
Exercise 9: Hiding Files Using NTFS Streams
Exercise 10: Hiding Data Using White Space Steganography
Exercise 11: Image Steganography Using OpenStego
Exercise 12: Image Steganography Using Quick Stego
Exercise 13: Viewing, Enabling, and Clearing Audit Policies Using Auditpol
Exercise 14: Covert Channels using Covert_TCP
Exercise 15: Hacking Windows Server 2012 with a Malicious Office Document Using TheFatRat
Exercise 16: Active Online Attack using Responder

Module 07 Malware Threats

Exercise 1: Creating an HTTP Trojan and Remotely Controlling a Target Machine Using HTTP RAT
Exercise 2: Creating a Trojan Server Using the GUI Trojan MoSucker
Exercise 3: Gaining Control over a Victim Machine Using njRAT
Exercise 4: Obfuscating a Trojan Using SwayzCryptor and Making it Undetectable to Various Anti-Virus Programs
Exercise 5: Creating a Server Using the ProRat Tool
Exercise 6: Creating a Trojan Server Using Theef
Exercise 7: Creating a Virus Using the JPS Virus Maker Tool
Exercise 8: Creating a Worm Using Internet Worm Maker Thing
Exercise 9: Virus Analysis using IDA
Exercise 10: Virus Analysis Using OllyDbg
Exercise 11: Detecting Trojans
Exercise 12: Monitoring TCP/IP Connections Using the CurrPorts
Exercise 13: Removing Malware using Clamwin
Exercise 14: Performing Registry Entry Monitoring
Exercise 15: Startup Program Monitoring Tool

Module 08 Sniffing

Exercise 1: Sniffing Passwords using Wireshark
Exercise 2: Analyzing a Network Using Capsa Network Analyzer
Exercise 3: Spoofing MAC Address Using SMAC
Exercise 4: Performing Man-in-the-Middle Attack using Cain & Abel
Exercise 5: Detecting ARP Poisoning in a Switch Based Network
Exercise 6: Detecting ARP Attacks with XArp Tool

Module 09 Social Engineering

Exercise 1: Sniffing Website Credentials Using Social Engineering Toolkit (SET)

Module 10 Denial-of-Service

Exercise 1: SYN Flooding a Target Host Using Metasploit
Exercise 2: SYN Flooding a Target Host Using hping3
Exercise 3: Performing Distributed Denial of Service Attack Using HOIC

Module 11 Session Hijacking

Exercise 1: Session Hijacking Using the Zed Attack Proxy (ZAP)

Module 12 Evading IDS Firewalls and Honeypots

Exercise 1: Detecting Intrusions Using Snort
Exercise 2: Detecting Malicious Network Traffic Using HoneyBOT
Exercise 3: Bypassing Windows Firewall Using Nmap Evasion Techniques
Exercise 4: Bypassing Firewall Rules Using HTTP/FTP Tunneling
Exercise 5: Bypassing Windows Firewall using Metasploit

Module 13 Hacking Web Servers

Exercise 1: Performing Web Server Reconnaissance using Skipfish
Exercise 2: Footprinting a Web Server Using the httprecon Tool
Exercise 3: Footprinting a Web Server Using ID Serve
Exercise 4: Cracking FTP Credentials Using Dictionary Attack
Exercise 5: Uniscan Web Server Fingerprinting in Kali Linux

Module 14 Hacking Web Applications

Exercise 1: Exploiting Parameter Tampering and XSS Vulnerabilities in Web Applications
Exercise 2: Enumerating and Hacking a Web Application Using WPScan and Metasploit
Exercise 3: Exploiting Remote Command Execution Vulnerability to Compromise a Target Web Server
Exercise 4: Auditing Web Application Framework Using Vega
Exercise 5: Website Vulnerability Scanning Using Acunetix WVS
Exercise 6: Exploiting File Upload Vulnerability at Different Security Levels
Exercise 7: Performing Cross-Site Request Forgery (CSRF) Attack

Module 15 SQL Injection

Exercise: 1 SQL Injection Attacks on an MS SQL Database
Exercise: 2 Scanning Web Applications Using N-Stalker Tool
Exercise: 3 Performing SQL Injection attack against MSSQL to extract Databases and WebShell using SQLMAP

Module 16 Hacking Wireless Networks

Exercise: 1 WiFi Packet Analysis using Wireshark
Exercise: 2 Cracking a WEP with Aircrack-ng
Exercise: 3 Cracking a WPA (Wi-Fi Protected Access) with Aircrack-ng

Module 17 Hacking Mobile Platforms

Exercise: 1 Creating Binary Payloads using Kali Linux to Hack Android
Exercise: 2 Harvesting Users’ Credentials Using the Social Engineering Toolkit

Module 19 Cloud Computing

Exercise: 1 Creating User Accounts and Assigning User Rights in ownCloud
Exercise: 2 Securing ownCloud from Malicious File uploads using ClamAV
Exercise: 3 Bypassing ownCloud Antivirus and Hacking the Host using Kali Linux
Exercise: 4 Implementing DoS Attack on Linux Cloud Server Using Slowloris Script

Module 20 Cryptography

Exercise 1: Calculating One-Way Hashes Using HashCalc
Exercise 2: Calculating MD5 Hashes Using MD5 Calculator
Exercise 3: Understanding File and Text Encryption Using CryptoForge
Exercise 4: Encrypting and Decrypting the Data Using BCTextEncoder
Exercise 5: Creating and Using Self-Signed Certificate
Exercise 6: Basic Disk Encryption Using VeraCrypt
Exercise 7: Basic Data Encryption Using CrypTool

Ec Council – Certified Ehical Hacker – CEH v10 – ilabs Complete

Module 02 – Footprinting and Reconnaissance

The objective of the lab is to extract information about the target organization that includes, but is not limited to:

  • Internet Protocol (IP) address and IP range associated with the target
  • Purpose of organization and why it exists
  • Size of the organization
  • Class of its IP block
  • People and contacts at the target
  • Types of operating systems (OS) and network topology in use
  • Type of firewall implemented, either hardware or software or combination
  • Type of remote access used, either SSH or VPN

Module 03 – Scanning Networks

The objective of this lab is to help students in conducting network scanning, port scanning, analyzing the network vulnerabilities, and so on.
You need to perform a network scan to:

  • Check live systems and open ports
  • Perform banner grabbing and OS fingerprinting
  • Identify network vulnerabilities
  • Draw network diagrams of vulnerable hosts

Module 04 – Enumeration

The objective of this lab is to provide expert knowledge on network enumeration and other responsibilities that include:

  • User name and user groups
  • Lists of computers, their operating systems, and ports
  • Machine names, network resources, and services
  • Lists of shares on individual hosts on the network
  • Policies and passwords

Module 05 – Vulnerability Analysis

The objective of this lab is to help students in conducting vulnerability scanning, analyzing the network vulnerabilities, and so on.
You need to perform a network scan to:

  • Check live systems and open ports
  • Perform banner grabbing and OS fingerprinting
  • Identify network vulnerabilities
  • Draw network diagrams of vulnerable hosts

Module 06 – System Hacking

The goal of system hacking is to gain access, escalate privileges, execute applications, and hide files.
The objective of this lab is to help students learn to monitor a system remotely and to extract hidden files and other tasks that include:

  • Extracting administrative passwords
  • Hiding files and extracting hidden files
  • Recovering passwords
  • Monitoring a system remotely

Module 07 – Malware Threats

The objective of this lab includes:

  • Creating and using different types of malware, such as Trojans, Viruses, and Worms, and exploiting a target machine as proof of concept
  • Detecting malware

Module 08 – Sniffing

The objective of this lab is to make students learn to sniff a network and analyze packets for any attacks on the network.
The primary objectives of this lab are to:

  • Sniff the network
  • Analyze incoming and outgoing packets
  • Troubleshoot the network for performance
  • Secure the network from attacks

Module 09 – Social Engineering

The objective of this lab is to:

  • Perform Credential Harvesting

Module 10 – Denial-of-Service

The objective of this lab is to help students learn to perform Denial of Service attacks and test a network for DoS flaws.
In this lab, you will:

  • Perform a DoS attack by sending a large number of SYN packets continuously
  • Perform a HTTP flooding attack
  • Perform a DDoS attack
  • Detect and analyze DoS attack traffic

Module 11 – Session Hijacking

The objective of this lab is to help students learn session hijacking and take over a user account.
In this lab, you will:

  • Intercept the Traffic between server and client
  • Attain a user session by intercepting the traffic
  • Perform ARP Poisoning using Cain & Abel
  • Modify Cookies and Hijack a session using Firebug

Module 12 – Evading IDS Firewalls and Honeypots

The objective of this lab is to help students learn and detect intrusions in a network, log, and view all log files.
In this lab, you will learn how to:

  • Install and configure Snort IDS
  • Detect Intruders using HoneyBot
  • Bypassing Windows Firewall Using Nmap
  • Bypassing Firewall Rules Using HTTP/FTP Tunneling
  • Bypassing Windows Firewall using Metasploit

Module 13 – Hacking Web Servers

The objective of this lab is to help students learn to detect unpatched security flaws, verbose error messages, and much more.
The objective of this lab is to:

  • Perform Web Server Security Reconnaissance
  • Detect unpatched security flaws like Shellshock bug
  • Crack remote passwords

Module 14 – Hacking Web Applications

The objective of this lab is to provide expert knowledge of web application vulnerabilities and attacks, such as:

  • Parameter tampering
  • Cross-Site Scripting (XSS)
  • Stored XSS
  • Username and Password Enumeration
  • Exploiting WordPress Plugin Vulnerabilities
  • Exploiting Remote Command Execution Vulnerability
  • Web Application Auditing Framework
  • Website Vulnerability Scanning

Module 15 – SQL Injection

The objective of this lab is to provide expert knowledge on SQL Injection attacks and other responsibilities that include:

  • Understanding when and how web application connects to a database server in order to access data
  • Extracting basic SQL Injection flaws and vulnerabilities
  • Testing web applications for Blind SQL Injection vulnerabilities
  • Scanning web servers and analyzing the reports
  • Securing information in web applications and web servers

Module 16 – Hacking Wireless Networks

The objective of this lab is to protect the wireless network from attackers.
In this lab, you will learn how to:

  • Analyze Wireless Network Traffic using Wireshark
  • Crack WEP using aircrack-ng
  • Crack WPA using aircrack-ng

Module 17 – Hacking Mobile Platforms

The objective of this lab is to help students learn to detect unpatched security flaws in mobile devices, and use them for performing penetration testing.
The objective of this lab is to:

  • Exploit the vulnerabilities in an Android device
  • Crack websites passwords
  • Use Android device to perform a DoS attack on a machine
  • Perform Security Assessment on an Android Device

Module 19 – Cloud Computing

The objective of this lab is to help students to build a cloud server, secure it with OpenSSL Encryption, and exploit java vulnerability to harvest user credentials.
In this lab, you will:

  • Create User Accounts and assign user rights
  • Securing ownCloud from malicious file uploads using ClamAV
  • Bypassing ownCloud Antivirus and hacking the host using Kali Linux

Module 20 – Cryptography

This lab will show you how to use encryption tools to encrypt data. It will teach you how to:

  • Use encrypting/decrypting techniques
  • Generate Hashes and checksum files

Tags : Footprinting and Reconnaissance, Scanning Networks, Enumeration, Vulnerability Analysis , System Hacking, Malware Threats, Sniffing, Social Engineering, Denial-of-Service, Session Hijacking, Evading IDS Firewalls and Honeypots, Hacking Web Servers, Hacking Web Applications, SQL Injection, Hacking Wireless Networks, Hacking Mobile Platforms, Cloud Computing, Cryptography

Linkedin Learning – My Certificates of Completion

ALISON – Project Maths – Higher Level

MODULE 1 Counting And Probability Complete

Learn more about counting and probability.

Arrangements And Selections Topic Completed
Expected Value Topic Completed
Probability Of Simple Events Topic Completed
Probability Of Compound Events Topic Completed
Independent Events Topic Completed
Probability Using Tree Diagrams Topic Completed
Probability Trees With And Without Replacement Topic Completed
Reverse Probability – Bayes’ Theorem Topic Completed
Bayes’ Theorem And Medical Testing Topic Completed
Probability Patterns Of Discrete Variables Topic Completed
Comparing Distributions Topic Completed
The Binomial Distribution Topic Completed
A Problem Using Binomial Distribution Topic Completed
Bernoulli Trials And The Binomial Formula Topic Completed
The Normal Distribution Topic Completed
Using Excel To Calculate Binomial Probabilities Topic Completed
Using Excel To Find The Mean Of A Binomial Distribution Topic Completed

MODULE 2 Statistics Complete

Learn more about statistics.

Cumulative Frequency And The Ogive Topic Completed
Cumulative Frequency, Quartiles And The Inter-Quartile Range Topic Completed
Mean Of Grouped Frequency Tables Topic Completed
Constructing A Stem And Leaf Diagram Topic Completed
Comparative Stem And Leaf Diagram Topic Completed
Histograms – Understanding That Area Gives Frequency Topic Completed
Introduction To Sampling Techniques Topic Completed
Random Stratified Sampling Topic Completed
Statistical Correlation Topic Completed
Measuring Correlation – Pearson’s Correlation Coefficient Topic Completed
Using Excel To Calculate Pearson’s Correlation Coefficient Topic Completed
Using Excel To Find Pearson’s Correlation Coefficient, Using The Inbuilt Function Topic Completed
Regression Lines And Their Equation Topic Completed
The Meaning Of The Coefficients In The Equation Of The Regression Line Topic Completed
Using Excel To Calculate The Equation Of The Regression Line Topic Completed
Using Excel To Find The Equation Of The Regression Line, Using Inbuilt Function Topic Completed

MODULE 3 Synthetic Geometry Complete

Learn more about synthetic geometry.

Properties Of Shapes Topic Completed
Geometric Reasoning – Part 1 Topic Completed
Geometric Reasoning – Part 2 Topic Completed
Geometric Reasoning – Part 3 Topic Completed
Geometric Reasoning – Part 4 Topic Completed
Proof Of Theorem 11 Topic Completed
Proof Of Theorem 12 Topic Completed
Proof Of Theorem 13 Topic Completed

MODULE 4 Coordinate Geometry Complete

Learn more about coordinate geometry.

Geometry With Coordinates Topic Completed
Equation Of A Straight Line Topic Completed
Parallel Lines Topic Completed
Perpendicular Lines Topic Completed
The Graphs Of Y=Kx^N Topic Completed
Translation Of Functions Topic Completed
Reflection Of Functions Topic Completed
Stretching Functions Topic Completed
General Transformation Of Functions Topic Completed
Equation Of A Circle 1 – Centre (0,0) Topic Completed
Equation Of A Circle 2 – Centre Not (0,0) Topic Completed
Equation Of A Circle 3 Topic Completed
Diameter Of A Circle Topic Completed
Tangent And Normal To A Circle Topic Completed
Touching Circles Topic Completed
Prove That A Line Is A Tangent To A Circle Topic Completed
Distance From A Point To A Line Topic Completed
Angle Between Two Lines Topic Completed
Dividing A Line Segment In A Given Ratio Topic Completed

MODULE 5 Trigonometry Complete

Learn more about trigonometry.

Finding Angles With Sine Ratio Topic Completed
Finding Sides With The Sine Ratio Topic Completed
Finding Angles With The Cosine Ratio Topic Completed
Finding Sides With The Cosine Ratio Topic Completed
Finding Angles With The Tangent Ratio Topic Completed
Finding Sides With The Tangent Ratio Topic Completed
Finding A Missing Side With The Sine Rule Topic Completed
Finding A Missing Angle With The Sine Rule Topic Completed
Problem Solving With The Cosine Rule Topic Completed
Introducing Radians Topic Completed
Using Radians To Find Area Of Sector Topic Completed
Sketching And Matching Trigonometric Functions Topic Completed
Graphing Trigonometric Functions. Y = Sinx – Calculator Work – In Degrees Topic Completed
Graphing Trigonometric Functions. Y = 3sin2x – Calculator Work – In Radians Topic Completed
Introducing The Unit Circle Topic Completed
The Unit Circle – Drawing Sine And Cosine Topic Completed
Comparing Degrees To Radians On The Unit Circle Topic Completed
Solving Trigonometric Equations Topic Completed
Proving The Sine Rule Topic Completed
Proving The Cosine Rule Topic Completed
Proving Trigonometric Identity – (Sin Squared + Cos Squared = 1) Topic Completed
Finding Areas With Trigonometry Topic Completed
3-D Trigonometry – The Cuboid Topic Completed
3-D Trigonometry – Rectangular Based Pyramid Topic Completed
Area Of A Segment Topic Completed

MODULE 6 Number Systems Complete

Learn more about number systems.

Large Numbers In Standard Form Topic Completed
Changing Decimals To Standard Fom Topic Completed
Changing Large Numbers From Standard Form Topic Completed
Changing Small Numbers From Standard Form Topic Completed
Adding And Multiplying Simple Powers Topic Completed
Working With Indices Topic Completed
Negative Indices Topic Completed
Fractional Indices, Numerator Of 1 Topic Completed
Index Power Equal To 0 Topic Completed
Positive Fractional Indices All Types Topic Completed
Negative Fractional Indices Topic Completed
Writing Index Numbers As A Power Of 2 Topic Completed
Quadratic Number Patterns Topic Completed
Manipulating Complex Numbers And The Complex Conjugate Topic Completed
The Argand Diagram And Modulus Topic Completed
The Meaning Of I Topic Completed
Patterns With Imaginary Numbers Topic Completed
Rational Or Irrational Topic Completed
Root 2 Is Irrational – Proof By Contradiction Topic Completed
Finding The Cube Roots Of 8 Topic Completed
Changing The Base Of Logarithms Topic Completed
Logarithmic Equations Topic Completed
Limits Of Sequences Topic Completed
Arithmetic Series Topic Completed
Geometric Series Topic Completed
Infinite Geometric Series – Part 1 Topic Completed
Infinite Geometric Series – Part 2 Topic Completed
Deriving Amortisation Formula From Geometric Series Topic Completed
The Sum Of The First N Natural Numbers – Proof By Induction Topic Completed
Proof By Induction Applied To A Geometric Series Topic Completed
Further Proof By Induction – Multiples Of 3 Topic Completed
Further Proof By Induction – Factorials And Powers Topic Completed

MODULE 7 Arithmetic – Financial Maths Complete

Learn more about arithmetic using financial maths.

Profit, Markup And Margin Topic Completed
Calculating Profit With Special Offers Topic Completed
Percentage Loss – Part 1 Topic Completed
Percentage Loss – Part 2 Topic Completed
Simple Interest – Calculating The Interest Topic Completed
Simple Interest – Calculating The Rate Topic Completed
Simple Interest – Calculating The Principal Topic Completed
Simple Interest – Calculating The Period Topic Completed
Percentage Changes Using Multipliers Topic Completed
Reverse Percentages And VAT Topic Completed
Introducing Compound Interest Topic Completed
Compound Interest And Annual Equivalent Rate Topic Completed
Compound Interest APR With Credit Cards Topic Completed
Depreciation Topic Completed
Calculating APR Topic Completed
Calculating Monthly Interest From APR – 2 Methods Topic Completed
Income Tax, USC And PRSI Topic Completed
Net Pay/Take Home Pay Topic Completed
Present Value – Working Out Future Value Topic Completed
Present Value – Working Out Present Value Topic Completed
Present Value – Harder Example Topic Completed
Present Value And Amortisation Problem Topic Completed
Completing An Amortization Schedule Topic Completed
Savings And Amortization Topic Completed

MODULE 8 Length, Area And Volume Complete

Learn more about length, area and volume.

Circumference Of A Circle Topic Completed
Area Of A Circle Topic Completed
Finding Radius And Diameter Of A Circle From Its Perimeter Topic Completed
Finding Radius And Diameter From Area Of Circle Topic Completed
Area Of Trapezium Topic Completed
Area Of Acute Angled Triangles Topic Completed
Area Of Obtuse Angled Triangles Topic Completed
Area Of Parallelogram Topic Completed
Area Of Rectangles Topic Completed
Area Compound Shapes (Rectangles) Topic Completed
Area Of Compound Shapes Topic Completed
Area Of Compound Shapes (Triangles) Topic Completed
Volume And Surface Area Topic Completed
Sectors And Arcs Topic Completed
Area Of A Segment Topic Completed
Volume Of Compound Solid

MODULE 9 Complex Numbers Complete

Learn more about complex numbers.

Manipulating Complex Numbers And The Complex Conjugate Topic Completed
The Argand Diagram And Modulus Topic Completed
The Meaning Of I Topic Completed
Patterns With Imaginary Numbers Topic Completed
Writing Complex Numbers In Polar Form Topic Completed
Multiplying And Dividing In Polar Form (Proof) Topic Completed
Multiplying And Dividing In Polar Form (Example) Topic Completed
Proof Of De Moivre’s Theorem Topic Completed
Complex Numbers When Solving Quadratic Equations Topic Completed
Cubic Equations With Complex Roots Topic Completed
Finding The Cube Roots Of 8 Topic Completed

MODULE 10 Expressions And Formulae Complete

Learn more about expressions and formulae.

Factorising Quadratics Topic Completed
Factorising – Difference Of Two Squares Topic Completed
Expanding Brackets (Grid Method) Topic Completed
Expanding Brackets (FOIL Method) Topic Completed
Expanding Any Two Brackets Topic Completed
Rearranging Simple Formulae Topic Completed
Rearranging Simple Formulae – 2 Steps Topic Completed
Rearranging Formulae With Squares And Square Roots Topic Completed
Rearranging Formulae New Subject Appearing Twice Topic Completed
Simplifying Surds Topic Completed
Further Calculations With Surds Topic Completed
Completing The Square Topic Completed
General Completing The Square Topic Completed
Binomial Expansion Topic Completed

MODULE 11 Solving Equations Complete

Learn more about solving equations.

Equations With Linear Functions In The Denominator Topic Completed
Quadratic Equations Using The Formula Topic Completed
Quadratic Equations Non Unitary X Squared Topic Completed
Quadratic Equations Both Brackets The Same Sign Topic Completed
Quadratic Equations Brackets With Different Signs Topic Completed
Quadratic Equations That Have To Be Rearranged Topic Completed
Solving Simultaneous Equations Graphically Topic Completed
Simultaneous Equations Both Negative Signs Topic Completed
Simultaneous Equations Negative And Positive Signs Topic Completed
Simultaneous Equations Both Positive Topic Completed
Hidden Quadratics Topic Completed
Use Of The Discriminant Topic Completed
Equations With Indices Topic Completed
Logarithmic Equations Topic Completed
Solving Exponential Equations Topic Completed
From Roots To Functions Topic Completed
Non-Linear Simultaneous Equations Topic Completed
Factor Theorem – Part 1 Topic Completed
Factor Theorem – Part 2 Topic Completed
The Remainder Theorem Topic Completed
General Remainder And Factor Theorem Topic Completed
Finding Roots Of Cubic Equation Topic Completed
Modulus Equations Topic Completed
Using Graphs To Solve Modulus Equations Topic Completed

MODULE 12 Inequalities Complete

Learn more about inequalities.

Finding Inequalities From Shaded Regions Topic Completed
Solving Linear Inequalities With Fractions Topic Completed
Solving Quadratic Inequalities – Method 1 Topic Completed
Solving Quadratic Inequalities – Method 2 Topic Completed
Solving Quadratic Inequalities – Method 3 Topic Completed
Non-Unitary X^2 – Trial And Error Method Topic Completed
Non-Unitary X^2 – Algebra Method Topic Completed
Non-Unitary X^2 – Graphical Method Topic Completed
Special Cases (Use SQI DoTS) Topic Completed
Rational Functions Topic Completed
Modulus Equations Topic Completed
Using Graphs To Solve Modulus Equations Topic Completed
Modulus Inequalities Topic Completed
Modulus Function On A Graph Topic Completed
Graphical Solution Of Modulus Inequalities Topic Completed

MODULE 13 Functions Complete

Learn more about functions.

Plotting Quadratic Graphs From Table Of Values Topic Completed
Plotting Cubic Graphs From Table Of Values Topic Completed
Plotting Reciprocal Graphs From Table Of Values Topic Completed
Plotting Exponential Graphs From Table Of Values Topic Completed
Matching Equations And Sketches Topic Completed
Sketching Parabola Using Completing The Square Topic Completed
Completing The Square And Sketching The Full Method Topic Completed
Matching Functions And Graphs – Quadratic / Exponential Topic Completed
Translation Of Functions Using F(X-A) Topic Completed
Translating Of Functions Using F(X)+A Topic Completed
Sketching Functions In X Direction Topic Completed
Sketching Functions In The Y Direction Topic Completed
The Discriminant Topic Completed
Inverse And Bijective Functions Topic Completed

MODULE 14 Calculus – Differentiation Complete

Learn more about differentiation.

Basic Differentiation Of Y = X^N Topic Completed
Differentiation Of Polynomials Topic Completed
Equation Of A Tangent Topic Completed
Equation Of A Normal Topic Completed
Harder Questions On Normals Topic Completed
General Differentiation Of X^N Topic Completed
Second Derivative Topic Completed
Differentiation Of Tangents Topic Completed
Using Different Variables Topic Completed
Differentiating Products And Quotients Topic Completed
The Chain Rule Topic Completed
The Product Rule Topic Completed
The Quotient Rule Topic Completed
Differentiation Of Logarithms Topic Completed
Differentiation Of Y = Sinx Topic Completed
Differentiation Of Y = Cosx Topic Completed
Differentiation And Rates Of Change Topic Completed
Rate Of Change – Example 1 Topic Completed
Rate Of Change – Example 2 Topic Completed
Differentiation And Turning Points Topic Completed
Differentiation And Matching Graphs Topic Completed
Applications Of Differentiation 1 (Displacement / Velocity / Acceleration) Topic Completed
Applications Of Differentiation 2 (Voltage / Current) Topic Completed
Maximum Volume Of Box Topic Completed
Exploring Relationships Between Graphs Of Cubic Functions And Their Differentials Topic Completed
Exploring Relationships Between Graphs Of Trigonometric Functions And Their Differentials Topic Completed
Exploring Relationships Between Graphs Of Exponential Functions And Their Differentials Topic Completed
Inverse Functions Differentiated Topic Completed

MODULE 15 Calculus – Integration Complete

Learn more about integration.

Basic Integration Topic Completed
The Integral Sign Topic Completed
Harder Integration Topic Completed
Definite Integration Topic Completed
Area Between Lines Topic Completed
Basic Differential Equations Topic Completed
Integration Of Trig Functions (Y=Cos4x) Topic Completed
Integration Of Exponentials Topic Completed
Introducing The Trapezoidal Rule Topic Completed
Trapezoidal Rule Into Integration Topic Completed
Finding The Area Between A Quadratic Function And A Straight Line Topic Completed

source : http://geffrotin.com/yann/certificats/Alison/Project%20Maths%20-%20Higher%20Level/Alison-Certificate-688-730067.pdf

Cybrary.it – Online Cyber Security Training, Free, Forever

Managing Apple Devices: Deploying and Maintaining iOS 9 and OS X El Capitan Review

Arek Dreyer and Adam karneboge are very well organised, are self-disciplined and persistent. They have written lot of books on Apple technologies. The writing is accurate and concise. They provide lot of step by step tutorials on management of Apple device. Like the Mobile Device Management (MDM).

I would like to thank Peachpit Press for helping create this book.

I highly recommend this book! This book will improve your mind and maybe, your life. This book can help you with solutions you might encounter in your work life. It will complete and improve your skills. I see this book as an opportunity to grow (if you grow, you’re customers will grow too; it’s a win-win situation) and master the subject at hand. After you learn something, you can teach others people. So, I think you can evolve professionally with this book.

I have published my review on Amazon, GoodRead and in my personal Blog.

Publié dans Apple, Informatique. Étiquettes : . Leave a Comment »